-
Notifications
You must be signed in to change notification settings - Fork 331
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(nextjs): Add CSP in middleware #5493
Conversation
🦋 Changeset detectedLatest commit: d822452 The changes in this PR will be included in the next version bump. This PR includes changesets to release 11 packages
Not sure what this means? Click here to learn what changesets are. Click here if you're a maintainer who wants to add another changeset to this PR |
The latest updates on your projects. Learn more about Vercel for Git ↗︎ 1 Skipped Deployment
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
This PR introduces a new CSP header utility to automatically inject a Clerk‐compatible Content Security Policy header, including support for nonce generation in strict-dynamic mode.
- Adds a new file (content-security-policy.ts) with functions to create, merge, and format CSP headers.
- Updates clerkMiddleware.ts to integrate the CSP header injection into the middleware flow and adjusts ClerkProvider.tsx to use a dedicated nonce header.
- Enhances test coverage by adding comprehensive tests for the new CSP functionality.
Reviewed Changes
Copilot reviewed 5 out of 5 changed files in this pull request and generated no comments.
Show a summary per file
File | Description |
---|---|
packages/nextjs/src/server/content-security-policy.ts | Introduces CSP header creation and processing functions, including nonce support. |
packages/nextjs/src/server/clerkMiddleware.ts | Integrates CSP header injection into the middleware and logs CSP details in debug mode. |
packages/nextjs/src/server/tests/content-security-policy.test.ts | Provides extensive tests for various CSP header scenarios and edge cases. |
packages/nextjs/src/app-router/server/ClerkProvider.tsx | Adjusts nonce extraction by adding support for a dedicated X-Nonce header. |
.changeset/vast-clubs-speak.md | Updates the changelog to record the addition of Clerk-compatible CSP header support. |
Comments suppressed due to low confidence (2)
packages/nextjs/src/server/content-security-policy.ts:200
- [nitpick] Consider pre-formatting the directive values into an array once before sorting to avoid redundant calls to CSPDirectiveManager.formatValue; this could improve performance and ensure consistent ordering.
const sortedValues = Array.from(values).sort((a, b) => {
packages/nextjs/src/server/clerkMiddleware.ts:196
- [nitpick] Ensure that the CSP header injection logic properly validates and sanitizes input values (both the host and any existing CSP header) to avoid potential header conflicts or injection issues, especially as the feature evolves.
if (options.injectCSP) {
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
c5b6e27
to
76e237b
Compare
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
!snapshot |
Hey @jacekradko - the snapshot version command generated the following package versions:
Tip: Use the snippet copy button below to quickly install the required packages. npm i @clerk/[email protected] --save-exact
npm i @clerk/[email protected] --save-exact
npm i @clerk/[email protected] --save-exact
npm i @clerk/[email protected] --save-exact
npm i @clerk/[email protected] --save-exact
npm i @clerk/[email protected] --save-exact
npm i @clerk/[email protected] --save-exact
npm i @clerk/[email protected] --save-exact
npm i @clerk/[email protected] --save-exact
npm i @clerk/[email protected] --save-exact
npm i @clerk/[email protected] --save-exact
npm i @clerk/[email protected] --save-exact
npm i @clerk/[email protected] --save-exact
npm i @clerk/[email protected] --save-exact
npm i @clerk/[email protected] --save-exact
npm i @clerk/[email protected] --save-exact
npm i @clerk/[email protected] --save-exact
npm i @clerk/[email protected] --save-exact
npm i @clerk/[email protected] --save-exact
npm i @clerk/[email protected] --save-exact
npm i @clerk/[email protected] --save-exact
npm i @clerk/[email protected] --save-exact |
|
||
// TODO @nikos: we need to make this more generic | ||
// and move the logic in clerk/backend | ||
if (requestState.headers) { | ||
requestState.headers.forEach((value, key) => { | ||
if (key === 'Content-Security-Policy') { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Minor: we can replace this string this with the constants
import from @clerk/backend
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👏
Description
Adding the ability to automatically inject the CSP header through
@clerk/nextjs
middleware.You can now configure
clerkMiddleware
with an optional paramcontentSecurityPolicy
like the following example:Closes: SDKI-913
Checklist
pnpm test
runs as expected.pnpm build
runs as expected.Type of change